heroui logo

Suspicious SQL Query

Sigma Rules

View Source
Summary
The 'Suspicious SQL Query' detection rule aims to identify potential malicious SQL queries that include keywords often associated with reconnaissance, data exfiltration, or destructive actions within a database environment. Specifically, it focuses on commands that can drop tables or select all fields in a way that indicates potential abuse. The rule operates by analyzing SQL query logs to pinpoint the presence of keywords such as 'drop', 'truncate', 'dump', or 'select *'. If these keywords are found within the logged SQL queries, an alert is generated, indicating a suspicious activity that warrants further investigation. The implementation requires that logging of SQL queries is enabled and functioning correctly for effective detection. Typical false positives for this rule may arise from legitimate monitoring and inventory-related activities, vulnerability scanning tools, and authorized applications that may perform legitimate operations containing similar keywords.
Categories
  • Database
Data Sources
  • Logon Session
  • Application Log
Created: 2022-12-27